Feature selection based intrusion detection system using the combination of DBSCAN, K-Mean++ and SMO algorithms V Shakya, RRS Makwana 2017 international conference on trends in electronics and informatics (ICEI …, 2017 | 37 | 2017 |
Cross site scripting (XSS) attack detection using intrustion detection system K Gupta, RR Singh, M Dixit 2017 International Conference on Intelligent Computing and Control Systems …, 2017 | 25 | 2017 |
Network forensics: detection and analysis of stealth port scanning attack RR Singh, DS Tomar International Journal of Computer Networks and Communications Security 3 (2 …, 2015 | 19 | 2015 |
A review of cyber attack classification technique based on data mining and neural network approach B Dharamkar, RR Singh Int. J. Comput. Trends Technol 7 (2), 100-105, 2014 | 19 | 2014 |
Design and development of potato grader. M Shyam, V Singh, R Singh | 16 | 1990 |
Cyber-attack classification using improved ensemble technique based on support vector machine and neural network B Dharamkar, RR Singh, B Dharamkar International Journal of Computer Applications 103 (11), 1-7, 2014 | 12 | 2014 |
Approaches for user profile investigation in orkut social network RR Singh, DS Tomar arXiv preprint arXiv:0912.1008, 2009 | 10 | 2009 |
Sharma (2015) R Singh, Y Ray, S Singh Cauliflower in textbook of vegetables, tuber crops and spices (EDs) S …, 0 | 8 | |
Dynamic surface control based ts-fuzzy model for a class of uncertain nonlinear systems UP Singh, S Jain, R Singh, M Parmar, R Makwana, J Kumare International Journal of Control Theory and Applications 9 (2), 1333-1345, 2016 | 7 | 2016 |
Water Use Efficiencies, Productivities, and Footprints of Rice under a System of Rice Intensification Practice A Biswas, DR Mailapalli, NS Raghuwanshi, R Singh ACS Agricultural Science & Technology 1 (3), 262-269, 2021 | 6 | 2021 |
Classifier rank identification using multi-criteria decision making method for intrusion detection dataset P Patsariya, RR Singh Int. J. Innov. Technol. Explor. Eng 9 (1), 1732-1738, 2019 | 5 | 2019 |
Port scanning attack analysis with Dempster–Shafer evidence theory RR Singh, DS Tomar Int. J. Appl. Eng. Res 12 (16), 5900-5904, 2017 | 5 | 2017 |
Integrated reservoir-based canal irrigation model. II: application A Bhadra, A Bandyopadhyay, NS Raghuwanshi, R Singh Journal of irrigation and drainage engineering 135 (2), 158-168, 2009 | 5 | 2009 |
Demography of the aphid parasitoid, Trioxys indicus (Hymenoptera: Aphidiidae) on different host-patch sizes R Singh Environment and Applied Biology 25 (4), 121-138, 1994 | 5 | 1994 |
Comparative Analysis of Computer Assisted Valuation of Descriptive Answers using WEKA with different classification algorithms RRSM Ruhi Dubey SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE …, 2017 | 4 | 2017 |
Comparative Analysis based Classification of KDD'99 Intrusion Dataset S Upadhyay, RR Singh International Journal of Computer Science and Information Security 13 (3), 14, 2015 | 4 | 2015 |
Generation of monthly irrigation maps for India using spatial interpolation techniques A Bhadra, NS Raghuwanshi, R Singh Sustainable Irrig. Drain. 4, 291, 2012 | 3 | 2012 |
An approach to meta-alert generation for anomalous tcp traffic D Kushwah, RR Singh, DS Tomar Security and Privacy: Second ISEA International Conference, ISEA-ISAP 2018 …, 2019 | 2 | 2019 |
Computer-Assisted Valuation of Descriptive Answers Using Weka with RandomForest Classification R Dubey, RRS Makwana Proceeding of the Second International Conference on Microelectronics …, 2019 | 2 | 2019 |
Study on prevalence of cardiovascular diseases in canines of Jammu SK Gupta, RK Bhardwaj, R Singh, AK Gupta Journal of Animal Research 7 (1), 201-204, 2017 | 2 | 2017 |